[<prev] [next>] [day] [month] [year] [list]
Message-ID: <464795BC.8070509@samba.org>
Date: Sun, 13 May 2007 17:48:28 -0500
From: "Gerald (Jerry) Carter" <jerry@...ba.org>
To: bugtraq@...urityfocus.com
Cc: security@...ba.org
Subject: [SAMBA-SECURITY] CVE-2007-2444: Local SID/Name Translation Failure
Can Result in User Privilege Elevation
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
==
== Subject: Local SID/Name translation bug can result
== in user privilege elevation
== CVE ID#: CVE-2007-2444
==
== Versions: Samba 3.0.23d - 3.0.25pre2 (inclusive)
==
== Summary: A bug in the local SID/Name translation
== routines may potentially result in a user
== being able to issue SMB/CIFS protocol
== operations as root.
==
==========================================================
===========
Description
===========
When translating SIDs to/from names using Samba local
list of user and group accounts, a logic error in the
smbd daemon's internal security stack may result in a
transition to the root user id rather than the non-root
user. The user is then able to temporarily issue SMB/CIFS
protocol operations as the root user. This window of
opportunity may allow the attacker to establish additional
means of gaining root access to the server.
==================
Patch Availability
==================
A patch against Samba 3.0.23d/3.0.24 has posted at
http://www.samba.org/samba/security/
==========
Workaround
==========
There is no immediate workaround for this defect that does
not involve changing the server code in the smbd daemon.
The Samba Team always encourages users to run the latest
stable release as a defense against attacks. If this
is not immediately possible, administrators should read
the "Server Security" documentation found at
http://www.samba.org/samba/docs/server_security.html
=======
Credits
=======
This vulnerability was reported to Samba developers by Paul
Griffith <paulg@....yorku.ca> and Andrew Hogue. Much thanks
to Paul and Andrew for their cooperation and patience in the
announcement of this defect. Thanks also to Samba developers
James Peach and Jeremy Allison for the analysis and resolution
of this issue.
The time line is as follows:
* March 20, 2007: Defect first reported to the security@...ba.org
email alias.
* March 30, 2007: Initial developer response by Gerald Carter.
* April 4, 2007: Patch released to bug reporter for testing.
* April 9, 2007: Fixed confirmed by original reporter.
* May 3, 2007: Announcement to vendor-sec mailing list
* May 14, 2007: Public announcement of the security issue.
==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFGR5W7IR7qMdg1EfYRAsv9AJ9KfUWTcyiDhLEDeIKJFGXaAWvk1gCff+0j
FFgPmJhGBosBPSadj+bPpgw=
=ruFz
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists